Patents by Inventor Dan Harkins
Dan Harkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8635444Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: GrantFiled: April 16, 2012Date of Patent: January 21, 2014Assignee: Trapeze Networks, Inc.Inventor: Dan Harkins
-
Publication number: 20120204031Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: ApplicationFiled: April 16, 2012Publication date: August 9, 2012Applicant: TRAPEZE NETWORKS, INC.Inventor: Dan Harkins
-
Patent number: 8161278Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: GrantFiled: March 10, 2009Date of Patent: April 17, 2012Assignee: Trapeze Networks, Inc.Inventor: Dan Harkins
-
Publication number: 20090198999Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: ApplicationFiled: March 10, 2009Publication date: August 6, 2009Applicant: Trapeze Networks, Inc.Inventor: Dan Harkins
-
Patent number: 7529925Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: GrantFiled: March 15, 2006Date of Patent: May 5, 2009Assignee: Trapeze Networks, Inc.Inventor: Dan Harkins
-
Publication number: 20070189222Abstract: Various embodiments are discussed for approaches to transparent mobility, which attempts to permit a wireless station to be handed off between wireless access points without packet loss, without noticeable delay to the station user, and/or without loss of session continuity.Type: ApplicationFiled: April 5, 2007Publication date: August 16, 2007Inventors: Tim Kolar, Edward Harriman, Stan Chesnutt, Allan Thomson, Dan Harkins
-
Patent number: 7221927Abstract: Various embodiments are discussed for approaches to transparent mobility, which attempts to permit a wireless station to be handed off between wireless access points without packet loss, without noticeable delay to the station user, and/or without loss of session continuity.Type: GrantFiled: February 13, 2004Date of Patent: May 22, 2007Assignee: Trapeze Networks, Inc.Inventors: Tim Kolar, Edward S. Harriman, Jr., Stan Chesnutt, Allan Thomson, Dan Harkins
-
Publication number: 20060248331Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: ApplicationFiled: March 15, 2006Publication date: November 2, 2006Inventor: Dan Harkins
-
Publication number: 20050180358Abstract: Various embodiments are discussed for approaches to transparent mobility, which attempts to permit a wireless station to be handed off between wireless access points without packet loss, without noticeable delay to the station user, and/or without loss of session continuity.Type: ApplicationFiled: February 13, 2004Publication date: August 18, 2005Applicant: Trapeze Networks, Inc.Inventors: Tim Kolar, Edward Harriman, Stan Chesnutt, Allan Thomson, Dan Harkins
-
Patent number: 6483921Abstract: A system and method for regenerating secret keys that have been used to encrypt communications between two parties are disclosed. The system and method involve securely escrowing only one of the private values that the parties use in a Diffie-Hellman exchange to establish secure communications between the parties. The public value for each communication session is controlled after the escrow of the private value, and the secret keys are regenerated from the escrowed private value and the controlled public values. The escrowed private value is transmitted to the escrow center with full proof of security and authenticity, and the escrowed private value can be changed and re-sent to the escrow center.Type: GrantFiled: October 18, 2000Date of Patent: November 19, 2002Assignee: Cisco Technology, Inc.Inventor: Dan Harkins
-
Patent number: 6215878Abstract: A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be the intended party. The method preferably uses a public key/private key encryption technique in which, for example, a trusted Certificate Authority in a public key infrastructure signs the certificates to provide the public keys involved in the encryption. Alternatively, the method, together with a symmetric cipher, uses a shared secret, established in an authenticated mechanism that is outside the information exchanges of the invention. Additionally, the method uses a strong mixing function that takes several items of data as input and produces a pseudorandom authentication (or digest). Inputs to the mixing function include identity stamps that are generated by each member M and key holder H.Type: GrantFiled: February 7, 2000Date of Patent: April 10, 2001Assignee: Cisco Technology, Inc.Inventor: Dan Harkins
-
Patent number: 6151395Abstract: The present invention is directed to a system and method for regenerating secret keys by escrowing only one private value in a Diffie-Hellman exchange where a public number is exchanged between the two participants according to the equation:Y=g.sup.X mod p,where Y is the Diffie-Hellman public number, X is the Diffie-Hellman private number, g is the generator, and p is the prime. The public value for each communication session is controlled after the escrow of the private value, and the secret keys are regenerated from the escrowed private value and the controlled public values. The escrowed private value is transmitted to the escrow center with full proof of security and authenticity and, if desired, this private value can be changed and re-sent to the escrow center.Type: GrantFiled: December 4, 1997Date of Patent: November 21, 2000Assignee: Cisco Technology, Inc.Inventor: Dan Harkins
-
Patent number: 6038322Abstract: A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be the intended party. The method preferably uses a public key/private key encryption technique in which, for example, a trusted Certificate Authority in a public key infrastructure signs the certificates to provide the public keys involved in the encryption. Alternatively, the method, together with a symmetric cipher, uses a shared secret, established in an authenticated mechanism that is outside the information exchanges of the invention. Additionally, the method uses a strong mixing function that takes several items of data as input and produces a pseudo-random authentication (or digest). Inputs to the mixing function include identity stamps that are generated by each member M and key holder H.Type: GrantFiled: October 20, 1998Date of Patent: March 14, 2000Assignee: Cisco Technology, Inc.Inventor: Dan Harkins